Unlock instant, AI-driven research and patent intelligence for your innovation.

Using IP heuristics to protect access tokens from theft and replay

a technology of access tokens and heuristics, applied in the field of using ip heuristics to protect access tokens from theft and replay, can solve problems such as access tokens being stolen

Active Publication Date: 2022-04-05
MICROSOFT TECH LICENSING LLC
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a method for generating an access token to access secured data items on a computing system. The access token includes the IP address of the user making the request, which is validated and used as the basis for granting access. Additionally, the patent describes a method to compare the IP address of the access token with the IP address of the system to determine if the access should be granted or not. The technical effect of this patent is to enhance security and access control for secured data items on a computing system.

Problems solved by technology

Unfortunately, however, it is possible that an access token may be stolen by a token thief, who is then able to use the token in place of the requesting computing device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Using IP heuristics to protect access tokens from theft and replay
  • Using IP heuristics to protect access tokens from theft and replay
  • Using IP heuristics to protect access tokens from theft and replay

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]An embodiment disclosed herein is related to computing systems and method for a computing system to generate an access token that includes an IP address from a request. In the embodiment, a request is received for access to one secured data items. The request may include user credentials that specify that a user making the request is permitted to access the secured data items. The user credentials are validated and an Internet Protocol (IP) address that the request was sent from is determined. An access token is generated that includes the IP address that the request was sent from.

[0018]An alternative embodiment herein is related to computing systems and method for a computing system to compare an IP address included in an access token to the IP address that the access token was sent from. An access token is received that includes a first Internet Protocol (IP) address. The access token causes the computing system to provide access to secured data items that are stored at the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment disclosed herein is related to computing systems and method for a computing system to generate an access token that includes an IP address from a request. In the embodiment, a request is received for access to one secured data items. The request may include user credentials that specify that a user making the request is permitted to access the secured data items. The user credentials are validated and an Internet Protocol (IP) address that the request was sent from is determined. An access token is generated that includes the IP address that the request was sent from.

Description

BACKGROUND[0001]Computer systems and related technology affect many aspects of society. Indeed, the computer system's ability to process information has transformed the way we live and work. Computer systems now commonly perform a host of tasks (e.g., word processing, scheduling, accounting, etc.) that prior to the advent of the computer system were performed manually. Computer systems have been coupled to one another and to other electronic devices to form both wired and wireless computer networks over which the computer systems and other electronic devices can transfer electronic data. As such, the performance of many computing tasks has become distributed across a number of different computer systems and / or a number of different computer environments.[0002]For example, one computing device may request to access secured data stored on a secured server. To ensure that the secured data remains secure, the secured server may require that the requesting computing device provide an acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3213H04L9/088H04L9/0866H04L9/3228G06F21/62H04L63/10H04L9/0891
Inventor BARHUDARIAN, VIOLET ANNALU, JIANGFENGBAKER, CALEB GEOFFREYMELZER, OREN JORDANBASU, ANIRBANMURUGESAN, PRAVEEN ERODE
Owner MICROSOFT TECH LICENSING LLC